DevSecOps - Getting Hands-on
This Page is intended to get details aligned for better security issues identification and resolution in infrastructure
** Stages **
SAST
- Static Application Security Testing scans the application source code and binaries to spot potential vulnerabilities before deployment using open source tools
- Tool Used: Sonarqube
- Priority: high
Secret Detection
- Check for credentials and secrets in commits. This category is at the “viable” level of maturity.
- Tool Used: XYZ
- Priority: medium
Code Quality
- Automatically analyze your source code to surface issues and see if quality is improving or getting worse with the latest commit.
- Tool Used: XYZ
- Priority: medium
DAST
- Dynamic Application Security Testing analyzes your running web application for known runtime vulnerabilities.
- It runs live attacks against a Review App, an externally deployed application, or an active API, created for every merge request
- Tool Used: XYZ
- Priority: high
IAST
- Interactive Application Security Testing checks runtime behavior of applications by instrumenting the code and checking for error conditions.
- It is composed by an agent that lives inside the application environment, and an external component, like DAST, that can interact and trigger unintended results.
- Tool Used: XYZ
- Priority: low
API Security
- API Security focuses on testing and protecting APIs.
- Testing for known vulnerabilities with DAST API and unknown vulnerabilities with API Fuzzing, API Security runs against a live API or a Review App to discover vulnerabilities that can only be uncovered after the API has been deployed.
- Users can provide credentials to test authenticated APIs.
- Tool Used: XYZ
- Priority: high
Fuzz Testing
Fuzz testing increase chances to get results by using arbitrary payloads instead of well-known ones. This category is at the “viable” level of maturity.
Tool Used: XYZ
Priority: high
Dependency Scanning
Analyze external dependencies (e.g. libraries like Ruby gems) for known vulnerabilities on each code commit
Tool Used: Dependency Track
Priority: high
License Compliance
Upon code commit, project dependencies are searched for approved and blacklisted licenses defined by custom policies per project.
Tool Used: LicenseFinder
Priority: medium
Vulnerability Database
In order to maintain the efficacy of those scans, we strive to keep their underlying vulnerability databases up-to-date.
Tool Used: XYZ
Priority: high
Security Benchmarking
Secure stage benchmarking for measuring security effectiveness in detecting security findings.
Tool Used: XYZ
Priority: ???
Attack Emulation
Continuously assess your applications and services are not vulnerable to security threats through automated, real-world emulated scenarios to identify weaknesses in your attack surface
Priority: low
Vulnerability Management
View, triage, trend, track, and resolve vulnerabilities detected in your applications. This category is at the “viable” level of maturity.
Tool Used: XYZ
Priority: high
Vulnerability Scanning
Coming Soon…
Penetration Testing
Coming Soon…
Fixing reported observations
Coming Soon…
OS Patching
- Few OS Patching is expected to be carried out as quarterly/half yearly activity
- Few OS Patching is expected to be carried out for each event of code promotion to higher environment.
References